{"title":"11 Courses","description":"","products":[{"product_id":"cybersecurity-specialist","title":"CyberSecurity Specialist","description":"\u003cdiv\u003e\n\u003cbr\u003e\n\u003ctable height=\"94\" style=\"width: 85.9487%; height: 169px;\" width=\"100%\"\u003e\n\u003ctbody\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\"\u003e40 Hours Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\u003cimg alt=\"\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/1.png?v=1711636130\" width=\"158\" height=\"28\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCertification Prep\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003eSecurity+\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Schedule\u003cbr\u003e\u003c\/strong\u003eCourse meets M-Th evenings for 5-hours (6pm - 11pm) for two consecutive weeks, OR for 10-hours on four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eBecome a CyberSecurity Specialist\u003cbr\u003e\u003c\/strong\u003eGain essential cybersecurity skills and enter or advance in this exciting IT specialty. Discover the core principles of information systems security and learn fundamental skills and tools to recognize, prevent, mitigate, and recover from security threats.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Description\u003cbr\u003e\u003c\/strong\u003e\u003cem\u003eCybersecurity Specialist\u003c\/em\u003e is a course designed to prepare you to enter the cybersecurity specialty from other roles in IT or to advance your skills if you have already made that transition at an entry level.\u003c\/p\u003e\n\u003cp\u003eBased on the essential knowledge and skills associated with the CompTIA Security+ certification, students who successfully complete this training will demonstrate competence in a variety of specific tasks and skills needed to support and maintain a high level of information and network security in an enterprise environment. Although not intended for advanced cybersecurity roles, it will prepare you to perform the basic and routine cybersecurity protocols and practices employers expect from security specialists at career entry and intermediate levels.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCertifications associated with this training\u003cbr\u003e\u003c\/strong\u003eThis course covers skills and knowledge associated with the CompTIA Security+ certification, helping you prepare for the CompTIA exam. Skill-building is the primary objective of this course and you will receive documentation as proof of competency to show employers. Our \u003cstrong\u003eCybersecurity Specialist Bundle\u003c\/strong\u003e or \u003cstrong\u003eCompTIA Security+ Test Prep Package\u003c\/strong\u003e are recommended for those seeking the Security+ certification.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eYour new skill set\u003cbr\u003e\u003c\/strong\u003eIT infrastructure, Networking \u0026amp; Firewalls, intrusion detection, server command line, permissions \u0026amp; security protocols, device management, connectivity diagnosis \u0026amp; troubleshooting, and more. \u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eHigh level skills you’ll gain from this training:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eAssess the security posture of an enterprise environment and recommend and implement appropriate fundamental security solutions\u003c\/li\u003e\n\u003cli\u003eMonitor and secure hybrid environments, including cloud, mobile and IoT\u003c\/li\u003e\n\u003cli\u003eOperate with an awareness of applicable laws and policies, including the principles of governance, risk and compliance\u003c\/li\u003e\n\u003cli\u003eIdentify, analyze and respond to security threats, attempted attacks, and other data security incidents\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e:\u003cstrong\u003e Additional skills you’ll build in this course:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eKnowledge of protocols such as SSL, HTTP, DNS, SMTP and IPSec\u003c\/li\u003e\n\u003cli\u003eAbility to implement multiple firewall technologies\u003c\/li\u003e\n\u003cli\u003ePacket shaper, load balancer and proxy server skills\u003c\/li\u003e\n\u003cli\u003eIntermediate to expert knowledge of intrusion detection system and intrusion prevention systems\u003c\/li\u003e\n\u003cli\u003eApplied knowledge of IT infrastructure, including protocols, operating systems and network Security\u003c\/li\u003e\n\u003cli\u003eUsing kernel modules\u003c\/li\u003e\n\u003cli\u003eSafe storage and virtualization\u003c\/li\u003e\n\u003cli\u003eDevice management at the enterprise level\u003c\/li\u003e\n\u003cli\u003eGit and automation\u003c\/li\u003e\n\u003cli\u003eUsing the server side and command line for security\u003c\/li\u003e\n\u003cli\u003eSever coverage\u003c\/li\u003e\n\u003cli\u003eTroubleshooting after an incident\u003c\/li\u003e\n\u003cli\u003eSELinux\u003c\/li\u003e\n\u003cli\u003eInstall and maintains the network and hardware systems\u003c\/li\u003e\n\u003cli\u003eDiagnose and repair connectivity issues\u003c\/li\u003e\n\u003cli\u003eEnsure users can only access the files they have permission to see\u003c\/li\u003e\n\u003cli\u003eMonitor networks to maintain speed and availability\u003c\/li\u003e\n\u003cli\u003eManage network backup systems\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho will benefit from this training\u003cbr\u003e\u003c\/strong\u003eIf you’re a current or aspiring cybersecurity specialist looking to raise your skills and your profile as a security expert, this course is for you. It’s recommended that you have at least 1 year of experience in IT, have a good working knowledge of hardware and software fundamentals and experience with networking and cloud computing. Certifications such as CompTIA A+ or Linux Essentials are recommended but not required.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eMyComputerCareer Skill-Builder Training\u003cbr\u003e\u003c\/strong\u003eIn today’s IT marketplace, acquired skills often trump certification in the eyes of many employers looking to fill specific roles. This training focuses on the skills in highest demand for this specialty. Competency assessment and documentation is provided for students to assure would-be employers that they have acquired the skills associated with each course. Students who wish to gain the certification associated with this course should consider purchasing the \u003cstrong\u003eCompTIA Cyber Security Analyst (CySA+) Bundle \u003c\/strong\u003eor the \u003cstrong\u003eCySA+ Test-Prep package\u003c\/strong\u003e available on this site.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSyllabus\u003c\/strong\u003e\u003cbr\u003e\u003ca href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/Skill_Builder_CyberSecurity_Specialist_Sec_2_Week.docx.pdf?v=1709911791\" rel=\"noopener\" target=\"_blank\"\u003e\u003cem\u003eCybersecurity Specialist\u003c\/em\u003e\u003c\/a\u003e\u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43578565361864,"sku":"100001","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD2.png?v=1747909674"},{"product_id":"cisco-networking-essentials-ts","title":"Cisco Certified Network Associate (CCNA)","description":"\u003cdiv\u003e\n\u003cbr\u003e\n\u003ctable width=\"100%\" style=\"width: 85.9487%; height: 169px;\" height=\"94\" data-mce-style=\"width: 85.9487%; height: 169px;\"\u003e\n\u003ctbody\u003e\n\u003ctr style=\"height: 25px;\" data-mce-style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\" data-mce-style=\"width: 66.6058%; text-align: center; height: 25px;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\" data-mce-style=\"width: 32.2993%; text-align: center; height: 25px;\"\u003e40 Hours Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\u003cimg alt=\"\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/2.png?v=1711636130\" width=\"158\" height=\"28\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003eCISCO Certified Network Associate (CCNA)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Schedule\u003cbr\u003e\u003c\/strong\u003eCourse meets M-Th evenings for 5-hours (6pm - 11pm) for two consecutive weeks, OR for 10-hours on four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eManage and optimize today’s advanced networks\u003cbr\u003e\u003c\/strong\u003eLearn to configure, manage, maintain, and secure routing devices in an enterprise environment. The skills you can gain from this prestigious networking training can help you elevate your IT career whether you’re working on a help desk or in network operations, support, administration, security, or engineering.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Description\u003cbr\u003e\u003c\/strong\u003eBecome a righteous router rockstar with \u003cem\u003eCISCO Networking Essentials. \u003c\/em\u003eThis course is designed to provide you with the essential skills and knowledge to operate successfully within the world’s largest and most widely-used network ecosystem–specifically as it relates to router configuration, management, maintenance and security. Of course, the principles and skills you learn here are highly transferable to other environments, as well.\u003c\/p\u003e\n\u003cp\u003eBased on the essential knowledge and skills associated with the coveted CISCO CCNA certification, students who successfully complete this training will demonstrate competence in a variety of specific tasks expected of a Network Administrator. You will gain in-depth knowledge of CISCO routers, switchers, and other hardware, software, tools, protocols, and methods required for switching, routing, and securing network traffic and data. You will also gain skills in monitoring and troubleshooting networks using safe and effective tools and technology.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCertifications associated with this training\u003cbr\u003e\u003c\/strong\u003eWhile successful completion of certification exams is not an expected outcome of this course, the training will help you prepare for the \u003cstrong\u003eCISCO Certified Network Associate (CCNA)\u003c\/strong\u003e certification directly from CISCO. See our Services offering for the CCNA test-prep package available as an enhancement to this course.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eYour new skill set\u003cbr\u003e\u003c\/strong\u003eUse Access Control Lists and NAT to secure a network, understand and apply VLSM, VLAN, and OSPF protocols for network configuration, configure and manage wireless networks, understand and apply static and dynamic routing protocols, and much more.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eHigh level skills you’ll gain from this training:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eInstall, configure, and maintain routing devices in an enterprise\u003c\/li\u003e\n\u003cli\u003eRecognize and evaluate VLSM, VLAN and OSPF protocols for network configuration\u003c\/li\u003e\n\u003cli\u003eUse Access Control Lists and Network Address Translation (NAT) to secure network environments\u003c\/li\u003e\n\u003cli\u003eConfiguing VLANs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e:\u003cstrong\u003e Additional skills you’ll build in this course:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFundamentals of network switching\u003c\/li\u003e\n\u003cli\u003eNetwork topology architectures\u003c\/li\u003e\n\u003cli\u003eUnderstanding of networking components and protocols\u003c\/li\u003e\n\u003cli\u003eSpanning Tree protocol\u003c\/li\u003e\n\u003cli\u003eConfiguring VLANs\u003c\/li\u003e\n\u003cli\u003eIP addressing and configuration with IPv4 subnetting and IPv6 configuration\u003c\/li\u003e\n\u003cli\u003eImplementing CISCO Wireless architecture and WLAN components\u003c\/li\u003e\n\u003cli\u003eCISCO WLC configuration and wireless management access\u003c\/li\u003e\n\u003cli\u003eUnderstanding and establishing virtual networks\u003c\/li\u003e\n\u003cli\u003ePrinciples and practices of IP connectivity and services\u003c\/li\u003e\n\u003cli\u003eStatic and dynamic routing protocols and configurations\u003c\/li\u003e\n\u003cli\u003eMonitor and manage wireless access points with WLC, servers and endpoints\u003c\/li\u003e\n\u003cli\u003eNTP Configuration\u003c\/li\u003e\n\u003cli\u003eDHCP concepts, configuration and verification\u003c\/li\u003e\n\u003cli\u003eNetwork traffic management using SNMP\u003c\/li\u003e\n\u003cli\u003eUsing NTP, DNA Center, and DHCP protocols to automate, configure, analyze, scale, and secure networks\u003c\/li\u003e\n\u003cli\u003eConfiguring Syslog for switching and routing\u003c\/li\u003e\n\u003cli\u003eNAT, SSH, FTP, and TFTP Configurations\u003c\/li\u003e\n\u003cli\u003eApplying security protocols to network routing and switching\u003c\/li\u003e\n\u003cli\u003eImplementing security programs with password policies and more\u003c\/li\u003e\n\u003cli\u003eRemote network management and troubleshooting\u003c\/li\u003e\n\u003cli\u003eAAA and VPN Security\u003c\/li\u003e\n\u003cli\u003eFHRP configuration and verification\u003c\/li\u003e\n\u003cli\u003eRouting configuration using PHB\u003c\/li\u003e\n\u003cli\u003eUsing Software Defined Networking (SDN) to program and automate network traffic and operations\u003c\/li\u003e\n\u003cli\u003eTechniques for mitigating security threats on the network\u003c\/li\u003e\n\u003cli\u003ePacket Tracer skills\u003c\/li\u003e\n\u003cli\u003eUsing APIs and the CISCO DNA Center\u003c\/li\u003e\n\u003cli\u003eAnd more…\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho will benefit from this training\u003cbr\u003e\u003c\/strong\u003eIf you’re an IT network technician, support specialist, data analyst, network\/systems administrator, cybersecurity specialist or in a similar role with 1-5 years experience and you’re looking to upgrade your skills or take the next step in your career, the CISCO Network Specialist skill-builder training could be the perfect fit. Prior certifications such as CompTIA A+, Network+, or comparable are also helpful.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eMyComputerCareer Skill-Builder Training\u003cbr\u003e\u003c\/strong\u003eIn today’s IT marketplace, acquired skills often trump certification in the eyes of many employers looking to fill specific roles. This training focuses on the skills in highest demand for this specialty. Competency assessment and documentation is provided for students to assure would-be employers that they have acquired the skills associated with each course. Students who wish to gain the certification associated with this course should consider purchasing the \u003cstrong\u003eCompTIA Cyber Security Analyst (CySA+) Bundle \u003c\/strong\u003eor the \u003cstrong\u003eCySA+ Test-Prep package\u003c\/strong\u003e available on this site.\u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43274749673672,"sku":"100002","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD_1.png?v=1747909673"},{"product_id":"cybersecurity-advanced-practitioner","title":"CyberSecurity Advanced Practitioner","description":"\u003cdiv\u003e\n\u003cbr\u003e\n\u003ctable width=\"100%\" style=\"width: 85.9487%; height: 75px;\" height=\"94\" data-mce-style=\"width: 85.9487%; height: 75px;\"\u003e\n\u003ctbody\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\"\u003e40 Hours Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\u003cimg height=\"28\" width=\"158\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/3.png?v=1711636130\" alt=\"\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCertification\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e CompTIA Advanced Security Practitioner (CASP+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Schedule\u003cbr\u003e\u003c\/strong\u003eCourse meets M-Th evenings for 5-hours (6pm - 11pm) for two consecutive weeks, OR for 10-hours on four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eTake your place as an ADVANCED Cybersecurity Practitioner \u003cbr\u003e\u003c\/strong\u003eHelp lead the cybersecurity initiatives in any organization. This fast-track, intensive training is designed to give you the skills that will propel your Cybersecurity career to the next level.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Description\u003cbr\u003e\u003c\/strong\u003eGet ready to take your cybersecurity career to the next level with the advanced skills and tools you'll need to take even greater responsibility for the data and systems security for any organization. When you complete this training, you'll be able to demonstrate your skills to identify and manage vulnerabilities and security threats across multiple IT infrastructures and platforms. You’ll be prepared to ensure the security, confidentiality, and integrity of all hardware, software, and data within an enterprise network environment following industry-standard security policies, procedures, and guidelines.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCertifications associated with this training\u003cbr\u003e\u003c\/strong\u003eThis course covers skills and knowledge associated with the CompTIA Advanced Security Practitioner (CASP+) certification, helping you prepare for the CompTIA exam. Skill-building is the primary objective of this course and you will receive documentation as proof of competency to show employers. Our \u003cstrong\u003eAdvanced CyberSecurity Practitioner Bundle\u003c\/strong\u003e or \u003cstrong\u003eCASP+ Test Prep Package\u003c\/strong\u003e are recommended for those seeking the CASP+ certification.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eYour new skill set\u003cbr\u003e\u003c\/strong\u003eGain critical competencies to face-down real-world cybersecurity challenges and implement powerful solutions including comprehensive incident response and prevention systems; intrusion detection and analysis; network security management; digital forensics techniques; risk management and mitigation, and more.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eHigh level skills you’ll gain from this training:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eApply proactive threat intelligence to support organizational security and perform vulnerability management activities\u003c\/li\u003e\n\u003cli\u003eApply security solutions consistent with NIST and other industry standards for infrastructure management and explaining software \u0026amp; hardware assurance best practices.\u003c\/li\u003e\n\u003cli\u003eApply advanced security concepts in support of organizational risk mitigation and understand and implement recommended frameworks, policies, procedures, and controls\u003c\/li\u003e\n\u003cli\u003eApply the appropriate incident response procedures, analyze potential indicators of compromise, and utilize basic digital forensics techniques.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e:\u003cstrong\u003e Additional skills you’ll build in this course:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eInstall and configure ManageEngine OpManager\u003c\/li\u003e\n\u003cli\u003eInstall and configure network load balancing\u003c\/li\u003e\n\u003cli\u003eScanning and remediating vulnerabilities with OpenVAS\u003c\/li\u003e\n\u003cli\u003eConfigure, verify and troubleshoot GRE Tunnel Connectivity\u003c\/li\u003e\n\u003cli\u003eCompliance patching\u003c\/li\u003e\n\u003cli\u003eSecuring mobile and embedded devices\u003c\/li\u003e\n\u003cli\u003eAdvanced data storage and network security protocols\u003c\/li\u003e\n\u003cli\u003eNetwork mapping\u003c\/li\u003e\n\u003cli\u003eImplementing AD Federation Services\u003c\/li\u003e\n\u003cli\u003eSecurity architecture\u003c\/li\u003e\n\u003cli\u003eSecurity engineering and cryptography skills\u003c\/li\u003e\n\u003cli\u003eSecuring industrial computing environments\u003c\/li\u003e\n\u003cli\u003eUsing encryption and steganography\u003c\/li\u003e\n\u003cli\u003ePerforming security assessments using MBSA and other tools\u003c\/li\u003e\n\u003cli\u003eWIreshark network traffic analysis\u003c\/li\u003e\n\u003cli\u003eImplementing SSL VPN using ASA Device Manager\u003c\/li\u003e\n\u003cli\u003eConfiguring two-factor authentication\u003c\/li\u003e\n\u003cli\u003eImplementing DNSSEC\u003c\/li\u003e\n\u003cli\u003ePerforming digital forensics\u003c\/li\u003e\n\u003cli\u003eAnd more…\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho will benefit from this training\u003cbr\u003e\u003c\/strong\u003eIf you are a current IT security pro looking to impress your boss and expand your cybersecurity skills to senior level expertise this course is for you.\u003c\/p\u003e\n\u003cp\u003eTo maximize  your success in this course, it is recommended that you possess the following:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e3 to 5 years of IT experience or education with 1-3 years of hands-on network security or related experience.\u003c\/li\u003e\n\u003cli\u003eThe ability and curiosity to recognize information security vulnerabilities and threats in the context of risk management.\u003c\/li\u003e\n\u003cli\u003eGeneral knowledge of the concepts and operational framework of common assurance safeguards in computing environments.\u003c\/li\u003e\n\u003cli\u003eOne or more certifications such as CompTIA A+, Security+ CYSA+ or similar are recommended but not required.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eMyComputerCareer Skill-Builder Training\u003cbr\u003e\u003c\/strong\u003eThis course covers skills and knowledge associated with the CompTIA Advanced Security Practitioner (CASP+) certification, helping you prepare for the CompTIA exam. Skill-building is the primary objective of this course and you will receive documentation as proof of competency to show employers. Our \u003cstrong\u003eAdvanced CyberSecurity Practitioner Bundle\u003c\/strong\u003e or \u003cstrong\u003eCASP+ Test Prep Package\u003c\/strong\u003e are recommended for those seeking the CASP+ certification.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSyllabus\u003c\/strong\u003e\u003cem\u003e\u003c\/em\u003e\u003cbr\u003e\u003ca href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/Skill_Builder_CyberSecurity_Advanced_Practitioner_CASP_2_Week.docx.pdf?v=1709911791\"\u003e\u003cem\u003eCybersecurity Advanced Practitioner\u003c\/em\u003e\u003c\/a\u003e\u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43276105253064,"sku":"100003","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD_3.png?v=1747909673"},{"product_id":"cybersec-first-responder","title":"CyberSec First Responder (CFR)","description":"\u003cdiv\u003e\n\u003cbr\u003e\n\u003ctable width=\"100%\" style=\"width: 85.9487%; height: 169px;\" height=\"94\"\u003e\n\u003ctbody\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\"\u003e40 Hours Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\u003cimg alt=\"\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/3.png?v=1711636130\" width=\"158\" height=\"28\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCertification Prep\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\n\u003cp\u003eCyberSec First Responder\u003cbr\u003e(CFR)\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Schedule\u003cbr\u003e\u003c\/strong\u003eThis course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCybersecurity First Responder\u003cbr\u003e\u003c\/strong\u003eBecome an \"EMT\" of information security as you provide ready response to cyber attacks. Armed with this first-responder skill set, you'll be on the scene at the battle's front to secure compromised data and mitigate damage before it's too late. Performing on-the-scene “triage” to diagnose the problem, then “stop the bleeding.” Be part of the solution that can save all stakeholders, inside your organization and out.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Description\u003cbr\u003e\u003c\/strong\u003e\u003cspan\u003eTo provide you with the knowledge, skills, and abilities to identify, respond to, protect against, and remediate malicious activities involving computer systems. Demonstrate the capacity to handle a changing threat landscape, assess risk and vulnerabilities, acquire and analyze data, determine scope, recommend remediation, and report results.\u003cbr\u003e\u003cbr\u003e\u003c\/span\u003eThreats to networks continue to increase dramatically and the vulnerability of the data on those networks creates intolerable risks for organizations and all their stakeholders, inside and out. Cybersecurity now demands robust teams of skilled professionals within any enterprise to anticipate, guard against, recognize and identify those threats, expeditiously intercept and remediate and repair damage.\u003cbr\u003e\u003cbr\u003eThe demand for network security professionals has never been higher and is still on the rise. With an ever-expanding surface of attack throughout networks enhanced by cloud and mobility, you can now be part of the growing army of first responders, battling to win the war on cyber crime.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCertifications associated with this training\u003cbr\u003e\u003c\/strong\u003e\u003cspan\u003eWhile successful completion of certification exams is not an expected outcome of this course, the training will prepare you for the Cybersec First Responder (CFR) certification exam from CertNexus.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eYour new skill set\u003cbr\u003e\u003c\/strong\u003e\u003cspan\u003eSpecifically identify, classify, and remediate threats to an organization, using threat research techniques. Read and interpret vulnerability assessment tools output to identify threats to specific types of technology. Emphasis is placed on the procedural requirements of responding to an incident. Develop the procedural skills  required to conduct effective digital forensic investigations.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eHigh level skills you’ll gain from this training:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eConduct security audits to assess cybersecurity risk \u0026amp; threat landscape\u003c\/li\u003e\n\u003cli\u003eReconnaissance Threat analysis through IT infrastructure assessment\u003c\/li\u003e\n\u003cli\u003eCompile cybersecurity information intelligence\u003c\/li\u003e\n\u003cli\u003eInvestigate cybersecurity incidents and respond accordingly\u003c\/li\u003e\n\u003cli\u003eCybersecurity Attack Analysis\u003c\/li\u003e\n\u003cli\u003eActive Asset, Network Analysis\u003c\/li\u003e\n\u003cli\u003eCybersecurity Incident Response\u003c\/li\u003e\n\u003cli\u003eRisk Assessments, Security Updates, and Plan creation\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e:\u003cstrong\u003e Additional skills you’ll build in this course:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntegrating Documentation into Risk Management\u003c\/li\u003e\n\u003cli\u003eDefine appropriate responses from the analysis of collected intel\u003c\/li\u003e\n\u003cli\u003eConstructing a Threat Profiles\u003c\/li\u003e\n\u003cli\u003eTrends Analysis Affecting Security Posture\u003c\/li\u003e\n\u003cli\u003ePerforming Network Reconnaissance\u003c\/li\u003e\n\u003cli\u003eRecon Incident Examination\u003c\/li\u003e\n\u003cli\u003eAssessing Social Engineering impacts\u003c\/li\u003e\n\u003cli\u003eConducting Social Engineering tests\u003c\/li\u003e\n\u003cli\u003eCalculating Aggregate CIA scores\u003c\/li\u003e\n\u003cli\u003eAssessing the Impact of Systems Hacking Attacks, Web-Based Threats, Malware, and DDoS Incidents\u003c\/li\u003e\n\u003cli\u003eAnalyzing Attacks on Computing and Network Environments\u003c\/li\u003e\n\u003cli\u003eAssessing the Impact of Hijacking and Impersonation Attacks\u003c\/li\u003e\n\u003cli\u003eCommand and Control, Lateral Movement,Pivoting and Anti-Forensics Techniques and Assessing their impact\u003c\/li\u003e\n\u003cli\u003ePenetration Testing on Network Assets\u003c\/li\u003e\n\u003cli\u003eNetwork-Based Security Intelligence collection\u003c\/li\u003e\n\u003cli\u003eCompletely Erasing Data from a Disk\u003c\/li\u003e\n\u003cli\u003eManaging Vulnerabilities in the Organization\u003c\/li\u003e\n\u003cli\u003eConducting Vulnerability Scans\u003c\/li\u003e\n\u003cli\u003eCollecting Host-Based Security Intelligence\u003c\/li\u003e\n\u003cli\u003eIdentifying and Analyzing an Incident using Windows and Linux tools\u003c\/li\u003e\n\u003cli\u003eContaining, Mitigating, and Recovering from Incidents\u003c\/li\u003e\n\u003cli\u003eActive Asset and Network Analysis\u003c\/li\u003e\n\u003cli\u003eAnalyzing Indicators of Compromise\u003c\/li\u003e\n\u003cli\u003eDeveloping an Incident Response System\u003c\/li\u003e\n\u003cli\u003eDisabling the Windows Command Prompt\u003c\/li\u003e\n\u003cli\u003eSecurely Collecting Electronic Evidence\u003c\/li\u003e\n\u003cli\u003eRecovering Deleted Data\u003c\/li\u003e\n\u003cli\u003eTracking Attackers Using Shellbags\u003c\/li\u003e\n\u003cli\u003eAnd more…\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho will benefit from this training\u003cbr\u003e\u003c\/strong\u003eAn excellent place to cut your teeth in the world of cybersecurity, especially if you’re blessed with a bit of a “hero complex.” It’s recommended that you have at least 1 or 2  years of experience in IT, with a basic understanding of network technology, like TCP\/IP, network security and VPNs. Experience should include professional track record in network administration or a similar field\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eMyComputerCareer Skill-Builder Training\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eIn today’s IT marketplace, acquired skills often trump certifications in the eyes of many employers looking to fill specific roles. This training focuses on the skills in highest demand for this specialty. Competency testing and documentation is provided for students to assure employers that they have acquired the skill sets associated with this unique course. Students who wish to gain the certification associated with this course should consider purchasing the EC Council CEH Test Prep package available on this site.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSyllabus\u003cbr\u003e\u003c\/strong\u003e\u003ca rel=\"noopener\" href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/Skill_Builder_CyberSecurity_First_Responder_CFR_2_Week.docx.pdf?v=1709911791\" target=\"_blank\"\u003e\u003cem\u003eCyber Security First Responder\u003c\/em\u003e\u003c\/a\u003e\u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43281951654088,"sku":"100047","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD_4.png?v=1747909671"},{"product_id":"cisco-cyber-operations-specialist","title":"Cisco Cyber Operations Specialist","description":"\u003cdiv\u003e\n\u003cbr\u003e\n\u003ctable height=\"94\" style=\"width: 85.9487%; height: 169px;\" width=\"100%\"\u003e\n\u003ctbody\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\"\u003e40 Hours\/Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\u003cimg alt=\"\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/3.png?v=1711636130\" width=\"158\" height=\"28\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCertification Prep\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\n\u003cp\u003eCISCO CyberOps Associate\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Schedule\u003cbr\u003e\u003c\/strong\u003eThis course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong data-mce-fragment=\"1\"\u003eBecome CyberOps specialized with prestigious CISCO training\u003cbr\u003e\u003c\/strong\u003eJoin the Cybersecurity \"Seal Team Six\" for your organization with elite level expertise. Master the skills needed to fully implement effective cyber-defense and counter-assault measures at an advanced level of enterprise operations.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Description\u003cbr\u003e\u003c\/strong\u003e\u003cem\u003e\u003cspan\u003eCISCO Cyber Operations Specialist \u003c\/span\u003e\u003c\/em\u003e\u003cspan\u003eprepares you for advanced associate-level roles in Security Operations Centers, so you can prevent, detect, and defend against cybersecurity threats at an enterprise level. Gain proficiency in the ability to identify, assess, respond to, and protect against those threats, and operate a system and network security analysis platform.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e \u003c\/span\u003e\u003cspan\u003eStudents will gain knowledge and develop skills related to security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures as well as preparation for the updated Cisco CyberOps Associate certification exam.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCertifications associated with this training\u003cbr\u003e\u003c\/strong\u003e\u003cspan\u003eWhile successful completion of certification exams is not an expected outcome of this course, the training will assist you in preparing you for the updated \u003cstrong\u003eCISCO CyberOps Associate \u003c\/strong\u003ecertification exam.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eYour new skill set\u003cbr\u003e\u003c\/strong\u003e\u003cspan\u003ePrepare to meet current and future threats to critical data and network infrastructure and be ready to work in a Security Operations Center (SOC). Understand and work with defense-in-depth, attack vectors, attack surfaces, and data types. Develop proficiency in host-based security monitoring, malware analysis tools, intrusion detection and prevention mechanisms, and much more.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eHigh level skills you’ll gain from this training:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eSecurity Concepts for Network Devices and operations\u003c\/li\u003e\n\u003cli\u003eDefense against Data Loss\u003c\/li\u003e\n\u003cli\u003eSecurity Monitoring\u003c\/li\u003e\n\u003cli\u003eHost Based Analysis\u003c\/li\u003e\n\u003cli\u003eNetwork Intrusion Analysis\u003c\/li\u003e\n\u003cli\u003eMonitoring from Linux Command Line\u003c\/li\u003e\n\u003cli\u003eThreat Mitigation Report Analysis\u003c\/li\u003e\n\u003cli\u003eIdentification of Forensic Evidence\u003c\/li\u003e\n\u003cli\u003eDeveloping Security Policies and Procedures\u003c\/li\u003e\n\u003cli\u003eCertification test preparation, including practice tests\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eAdditional skills you’ll build in this course:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFiltering, Packet Capture and Packet Analysis\u003c\/li\u003e\n\u003cli\u003eSecurity Attack Concepts\u003c\/li\u003e\n\u003cli\u003eNetwork and Web Attacks and Evasions\u003c\/li\u003e\n\u003cli\u003eUtilizing Attack Trees\u003c\/li\u003e\n\u003cli\u003eSetup CyberOps VM Machine\u003c\/li\u003e\n\u003cli\u003eDigital Signatures\u003c\/li\u003e\n\u003cli\u003eSSL\/TLS Components\u003c\/li\u003e\n\u003cli\u003eMastery of Windows and Linux Host Terminology\u003c\/li\u003e\n\u003cli\u003eUnderstanding Process, Threads, Handles and Windows Registry\u003c\/li\u003e\n\u003cli\u003eLog Data Interpretation\u003c\/li\u003e\n\u003cli\u003eIncident Response Protocols\u003c\/li\u003e\n\u003cli\u003eCSIRT Goals and Cybersec Elements\u003c\/li\u003e\n\u003cli\u003eCategorize and Classify Intrusions\u003c\/li\u003e\n\u003cli\u003eFirepower Management, Console Analysis, and Analysis Methods\u003c\/li\u003e\n\u003cli\u003eAttacking a mySQL Database\u003c\/li\u003e\n\u003cli\u003e5-Tuple correlation and Data normalization\u003c\/li\u003e\n\u003cli\u003eHandling Incident Events and Evidence\u003c\/li\u003e\n\u003cli\u003eCVSS 3.0 Scoring\u003c\/li\u003e\n\u003cli\u003eSecuring File Systems\u003c\/li\u003e\n\u003cli\u003eAnd more…\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho will benefit from this training\u003cbr\u003e\u003c\/strong\u003e\u003cspan\u003eIf you’re an advancing cybersecurity pro with a passion for “guarding the fort” and repelling intruders in support of your organization and all of its stakeholders, this is the program for you. At least 3-5 years of experience in IT is recommended, with a good working knowledge of networking, cloud computing and cybersecurity. Experience with CISCO hardware, software and systems is also strongly recommended with at least one CISCO certification (i.e. CCNA) preferred. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eMyComputerCareer Skill-Builder Training\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eIn today’s IT marketplace, acquired skills often trump certifications in the eyes of many employers looking to fill specific roles. This training focuses on the skills in highest demand for this specialty. Competency testing and documentation is provided for students to assure employers that they have acquired the skill sets associated with this unique course. Students who wish to gain the certification associated with this course\u003cstrong\u003e\u003c\/strong\u003e should consider purchasing the EC Council CEH Test Prep package available on this site.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSyllabus\u003cbr\u003e\u003c\/strong\u003e\u003ca rel=\"noopener\" href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/Skill_Builder_CyberSecurity_Specialist_Sec_2_Week.docx.pdf?v=1709911791\" target=\"_blank\"\u003e\u003cem\u003eCISCO Cyber Operations Specialist\u003c\/em\u003e\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43281954046152,"sku":"100046","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD_7.png?v=1747909670"},{"product_id":"cybersecurity-analyst-bogo","title":"CyberSecurity Analyst","description":"\u003cdiv\u003e\n\u003cbr\u003e\n\u003ctable width=\"100%\" style=\"width: 85.9487%; height: 169px;\" height=\"94\"\u003e\n\u003ctbody\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\"\u003e40 Hours Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003e\u003cimg alt=\"\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/2.png?v=1711636130\" width=\"158\" height=\"28\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\"\u003e\u003cstrong\u003eCertification Prep\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\"\u003eCompTIA Cyber Security Analyst (CySA+)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003ch3 style=\"text-align: center;\"\u003e\u003cspan style=\"background-color: rgb(220, 114, 56); color: rgb(255, 255, 255);\"\u003eSave \u003cstrong\u003e$500\u003c\/strong\u003e by attending the class in-person. Use PromoCode \u003cstrong\u003eINPERSON!\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h3\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Schedule\u003cbr\u003e\u003c\/strong\u003eCourse meets M-Th evenings for 5-hours (6pm - 11pm) for two consecutive weeks, OR for 10-hours on four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eMaster the skills of a Cybersecurity Analyst\u003cbr\u003e\u003c\/strong\u003eThis is your CyberSecurity Analyst skill set training. In this role, you will monitor and manage networks to protect the security of systems and data. This 40-hour training will arm you with the tools, knowledge, and skills necessary to function in this critical role.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Description\u003cbr\u003e\u003c\/strong\u003e\u003cem\u003eCybersecurity Analyst\u003c\/em\u003e is a course designed to prepare you to take on the responsibilities associated with this pivotal role on the information security squad within your organization (or another) or to expand your capabilities in the role if you already hold that title. \u003c\/p\u003e\n\u003cp\u003eBased on the essential knowledge and skills associated with the CompTIA Cyber Security Analyst certification (CySA+), students who successfully complete this training will demonstrate competence in a variety of specific tasks expected of the security analyst. You will gain in-depth knowledge of various tools associated with threat detection and risk mitigation and how to configure and use them in securing networks and data. You will also advance your ability to monitor and analyze network activity in order to identify malware and other potential threats and recommend or implement appropriate countermeasures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCertifications associated with this training\u003cbr\u003e\u003c\/strong\u003eThis course covers skills and knowledge associated with the CompTIA CySA+ certification, helping you prepare for the CompTIA exam. Skill-building is the primary objective of this course and you will receive documentation as proof of competency to show employers. Our \u003cstrong\u003eCybersecurity Analyst Bundle\u003c\/strong\u003e or \u003cstrong\u003eCompTIA CySA+ Test Prep Package\u003c\/strong\u003e are recommended for those seeking the CySA+ certification.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eYour new skill set\u003cbr\u003e\u003c\/strong\u003eIdentify “malware” and system\/data vulnerabilities, recommend and apply appropriate tools and protocols to mitigate threats, configure threat-detection tools, analyze and interpret data to identify vulnerabilities, and more.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eHigh-level skills you’ll gain from this training:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eIdentify the presence of malware on the network and recommend tools and strategies to mitigate the threat\u003c\/li\u003e\n\u003cli\u003eRecognize Advanced Persistent Threats (APTs) across a broad attack surface\u003c\/li\u003e\n\u003cli\u003eConfigure and use threat detection tools and protocols\u003c\/li\u003e\n\u003cli\u003eAnalyze network performance data to identify vulnerabilities, threats, risks, and potential data breaches or malware attacks\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eAdditional skills you’ll build in this course:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eNetwork topology discovery (passive \u0026amp; active)\u003c\/li\u003e\n\u003cli\u003eSocial Engineering Reconnaissance\u003c\/li\u003e\n\u003cli\u003eWindows command line tools for threat detection \u0026amp; mitigation\u003c\/li\u003e\n\u003cli\u003eHow to monitor network servers for security\u003c\/li\u003e\n\u003cli\u003eGathering and interpreting threat intelligence\u003c\/li\u003e\n\u003cli\u003eIdentifying attack types, assessing risk, deploying countermeasures\u003c\/li\u003e\n\u003cli\u003eDNS harvesting\u003c\/li\u003e\n\u003cli\u003ePacket sniffing\u003c\/li\u003e\n\u003cli\u003eUnderstanding and identifying malware threats\u003c\/li\u003e\n\u003cli\u003eCompliance patching\u003c\/li\u003e\n\u003cli\u003eData encryption and hashing\u003c\/li\u003e\n\u003cli\u003eImplementing SSl VPN using ASA Device Manager\u003c\/li\u003e\n\u003cli\u003eImplementing the CISCO Adaptive Security Appliance\u003c\/li\u003e\n\u003cli\u003eIOS features for threat mitigation\u003c\/li\u003e\n\u003cli\u003eIntrusion detection and traffic analysis\u003c\/li\u003e\n\u003cli\u003eVulnerability scanning with MBSA and Nessus\u003c\/li\u003e\n\u003cli\u003eIntroduction to digital forensics\u003c\/li\u003e\n\u003cli\u003eImplementing initial and advanced phases of incident response\u003c\/li\u003e\n\u003cli\u003eGRE tunnel connectivity - configuration, verification, troubleshooting\u003c\/li\u003e\n\u003cli\u003eVulnerability detection using IPv4\/IPv6 access lists for traffic filtering\u003c\/li\u003e\n\u003cli\u003ePort security configuration, verification, \u0026amp; troubleshooting\u003c\/li\u003e\n\u003cli\u003eSecurity assessments and compliance\u003c\/li\u003e\n\u003cli\u003eAlienVault Monitoring \u0026amp; Reporting - SIEM and Netflow\u003c\/li\u003e\n\u003cli\u003eManual SQL injection and password cracking - DVWA\u003c\/li\u003e\n\u003cli\u003eUser account security and data privacy protocols\u003c\/li\u003e\n\u003cli\u003eSoftware development security measures\u003c\/li\u003e\n\u003cli\u003eWireless \u0026amp; cloud security assessment tools and methods\u003c\/li\u003e\n\u003cli\u003eAnd more…\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho will benefit from this training\u003cbr\u003e\u003c\/strong\u003eIf you’re a current IT network technician, data analyst or cybersecurity specialist looking to prepare for the next step in your career progression, the security analyst role may be right for you. It’s recommended that you have at least 2 years of experience in IT, a good working knowledge of networks \u0026amp; system\/data security protocols, and experience with data acquisition and analytics. Certifications such as CompTIA A+, Security+, or comparable are recommended.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eMyComputerCareer Skill-Builder Training\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eIn today’s IT marketplace, acquired skills often trump certification in the eyes of many employers looking to fill specific roles. This training focuses on the skills in highest demand for this specialty. Competency assessment and documentation is provided for students to assure would-be employers that they have acquired the skills associated with each course. Students who wish to gain the certification associated with this course should consider purchasing the \u003cstrong\u003eCompTIA Cyber Security Analyst (CySA+) Bundle \u003c\/strong\u003eor the \u003cstrong\u003eCySA+ Test-Prep package\u003c\/strong\u003e available on this site.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSyllabus\u003c\/strong\u003e\u003cbr\u003e\u003ca href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/Skill_Builder_CyberSecurity_Analyst_CySA_2_Week.pdf?v=1709911791\" rel=\"noopener\" target=\"_blank\"\u003e\u003cem\u003eCybersecurity Analyst\u003c\/em\u003e\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43430324437192,"sku":"100048","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD_6.png?v=1747909675"},{"product_id":"a-it-essentials-1","title":"CompTIA A+ IT Essentials 1","description":"\u003ctable height=\"94\" style=\"width: 85.9487%; height: 169px;\" width=\"100%\" data-mce-fragment=\"1\"\u003e\n\u003ctbody data-mce-fragment=\"1\"\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\" data-mce-fragment=\"1\"\u003e40 Hours\/Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cimg alt=\"\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/1.png?v=1711636130\" width=\"152\" height=\"27\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCertification Prep\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eCompTIA A+ \u003cbr\u003eCore One - 1101\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003ch3 style=\"text-align: center;\"\u003e\u003cspan style=\"background-color: rgb(220, 114, 56); color: rgb(255, 255, 255);\"\u003eSave \u003cstrong\u003e$500\u003c\/strong\u003e by attending the class in-person. Use PromoCode \u003cstrong\u003eINPERSON!\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h3\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eCourse Schedule:\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eThis course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003e \u003c\/span\u003e\u003cb\u003eA+ IT Essentials 1: Foundational Skills\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003e\u003cbr\u003eGain essential knowledge of computer hardware, networking fundamentals, and troubleshooting techniques with A+ IT Essentials 1. This course introduces core concepts in mobile device hardware, networking setups, hardware components, virtualization, and more.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eCourse Description\u003cbr\u003e\u003c\/b\u003e\u003ci\u003e\u003cspan style=\"font-weight: 400;\"\u003eA+ IT Essentials 1\u003c\/span\u003e\u003c\/i\u003e\u003cspan style=\"font-weight: 400;\"\u003e introduces students to the foundational aspects of IT, focusing on computer hardware, networking essentials, and troubleshooting methodologies. From mobile device hardware to wireless networking and virtualization, this course covers essential topics to kickstart your IT career.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eCertifications associated with this training\u003c\/b\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003eThis course prepares you for the CompTIA A+ Core One - 1101 certification exam. Successful completion provides a strong foundation for further advancement in the IT field. Our \u003c\/span\u003e\u003cb\u003eA+ IT Essentials 1 Bundle\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003e or \u003c\/span\u003e\u003cb\u003eA+ Core One Test Prep Package\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003e are recommended for those seeking certification.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eYour new skill set\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eMobile device hardware, Networking fundamentals, Hardware components, Virtualization basics, Troubleshooting techniques, and more.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eKey topics covered in this course:\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eMobile device hardware and installation, Networking setup and configurations, Hardware components and troubleshooting, Introduction to virtualization and cloud computing, Troubleshooting hardware and network issues.\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eIdentifying, installing, and troubleshooting various hardware components including CPUs, RAM, motherboards, and storage devices such as hard drives and SSDs.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUnderstanding different types of peripheral devices like printers, monitors, keyboards, and mice, and troubleshooting issues related to them.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eConfiguring and troubleshooting mobile devices, including smartphones and tablets, and understanding mobile operating systems and network connectivity.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUnderstanding networking concepts such as TCP\/IP, DHCP, DNS, and troubleshooting common networking issues.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eInstalling, configuring, and troubleshooting wired and wireless network connections, including routers, switches, access points, and modems.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eManaging operating systems including Windows, macOS, Linux, and mobile operating systems, and configuring operating system settings.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eImplementing basic security measures such as password policies, encryption, and data backup strategies, and identifying and removing malware.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUnderstanding cloud computing concepts and virtualization technologies, and configuring and managing cloud-based services and virtual machines.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eImplementing basic IT operational procedures including proper use of tools, safety procedures, and best practices for documentation and communication.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli style=\"font-weight: 400;\" aria-level=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eTroubleshooting common hardware, software, and network issues using appropriate tools and techniques, and providing solutions to end-users effectively.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43577938804936,"sku":"100034","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD1.jpg?v=1747909651"},{"product_id":"a-it-essentials-2","title":"CompTIA A+ IT Essentials 2","description":"\u003ctable height=\"94\" style=\"width: 85.9487%; height: 169px;\" width=\"100%\" data-mce-fragment=\"1\"\u003e\n\u003ctbody data-mce-fragment=\"1\"\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\" data-mce-fragment=\"1\"\u003e40 Hours\/Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cimg alt=\"\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/1.png?v=1711636130\" width=\"152\" height=\"27\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCertification Prep\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eCompTIA A+ \u003cbr\u003eCore Two- 1102\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003ch3 style=\"text-align: center;\"\u003e\u003cspan style=\"background-color: rgb(220, 114, 56); color: rgb(255, 255, 255);\"\u003eSave \u003cstrong\u003e$500\u003c\/strong\u003e by attending the class in-person. Use PromoCode \u003cstrong\u003eINPERSON!\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h3\u003e\n\u003cp\u003e\u003cb\u003eCourse Schedule:\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eThis course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003cbr\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003e\u003cb data-mce-fragment=\"1\"\u003eA+ IT Essentials 2: Advanced Skills\u003c\/b\u003e\u003cbr\u003eEnhance your IT expertise with A+ IT Essentials 2, covering secure device software management, advanced troubleshooting, and professional communication techniques. This course delves into desktop, server, and mobile operating systems, security measures, and more.\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eCourse Description\u003cbr\u003e\u003c\/b\u003e\u003ci data-mce-fragment=\"1\"\u003e\u003cspan style=\"font-weight: 400;\" data-mce-fragment=\"1\"\u003eA+ IT Essentials 2\u003c\/span\u003e\u003c\/i\u003e\u003cspan style=\"font-weight: 400;\" data-mce-fragment=\"1\"\u003e expands on the foundational knowledge acquired in A+ IT Essentials 1, focusing on secure device software management, troubleshooting OS issues, and advanced security measures. This course equips you with the skills needed to excel in IT support roles and beyond.\u003c\/span\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eCertifications associated with this training\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eThis course prepares you for the CompTIA A+ Core Two - 1102 certification exam. Successful completion enhances your employability in various IT roles. Our \u003c\/span\u003e\u003cb style=\"font-size: 0.875rem;\"\u003eA+ IT Essentials 2 Bundle\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003e or \u003c\/span\u003e\u003cb style=\"font-size: 0.875rem;\"\u003eA+ Core Two Test Prep Package\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003e are recommended for those seeking certification.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eYour new skill set\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eOperating systems management, Security configuration, Helpdesk support, Troubleshooting OS issues, Malware detection, and more. (See full Course Description below for more details.)\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003eEnhance your IT expertise with A+ IT Essentials 2, covering secure device software management, advanced troubleshooting, and professional communication techniques. This course delves into desktop, server, and mobile operating systems, security measures, and more.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eKey topics covered in this course:\u003c\/b\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003eDesktop, server, and mobile operating systems management, Security configuration fundamentals, Troubleshooting OS issues, Helpdesk support systems, Malware detection and prevention.\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eConfiguring and troubleshooting desktop, server, and mobile operating systems such as Windows, macOS, Linux, iOS, and Android.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eManaging system settings, user accounts, permissions, and group policies in various operating systems.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUsing command-line tools and utilities to perform system administrative tasks and troubleshoot operating system issues.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUnderstanding licensing, activation, and software update procedures for operating systems and applications.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eImplementing security measures including user authentication, access control, encryption, and firewalls to protect systems and data.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eIdentifying common security threats and vulnerabilities, and implementing security best practices to mitigate risks.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eSetting up and securing small office\/home office (SOHO) networks, including configuring routers, firewalls, and wireless access points.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eConfiguring and troubleshooting web browser security settings, and recognizing and preventing common web-based attacks.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eDetecting, removing, and preventing malware infections using antivirus software and other security tools.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eProviding helpdesk support to end-users, including troubleshooting software issues, hardware problems, and network connectivity issues.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eManaging IT change processes, including documenting changes, implementing change controls, and ensuring system stability.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUnderstanding and applying proper communication techniques and professionalism in a business environment.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cb\u003e\u003cbr\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43577948373192,"sku":"100035","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD_3.jpg?v=1747909651"},{"product_id":"network-it-essentials","title":"Network+ IT Essentials","description":"\u003ctable width=\"100%\" style=\"width: 85.9487%; height: 169px;\" height=\"94\" data-mce-fragment=\"1\"\u003e\n\u003ctbody data-mce-fragment=\"1\"\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; text-align: center; height: 25px;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Length\/Delivery\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; text-align: center; height: 25px;\" data-mce-fragment=\"1\"\u003e40 Hours\/Online\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Difficulty\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cimg height=\"27\" width=\"152\" src=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/2.png?v=1711636130\" alt=\"\"\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 25px;\" data-mce-fragment=\"1\"\u003e\n\u003ctd style=\"width: 66.6058%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCertification Prep\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"width: 32.2993%; height: 25px; text-align: center;\" data-mce-fragment=\"1\"\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eNetwork+\u003c\/span\u003e\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003ch3 style=\"text-align: center;\"\u003e\u003cspan style=\"background-color: rgb(220, 114, 56); color: rgb(255, 255, 255);\"\u003eSave \u003cstrong\u003e$500\u003c\/strong\u003e by attending the class in-person. Use PromoCode \u003cstrong\u003eINPERSON!\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h3\u003e\n\u003cp\u003e\u003cb\u003eCourse Schedule:\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eThis course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eBecome a Network+ IT Specialist\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eMaster the essential skills to manage, configure, and troubleshoot computer networks with Network+ IT Essentials. Gain valuable expertise in network hardware, protocols, troubleshooting, and security to thrive in today's competitive IT landscape.\u003cbr\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eFull Course Description\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eNetwork+ IT Essentials is a comprehensive course designed to equip you with the skills and knowledge needed to manage, configure, and troubleshoot computer networks effectively. Covering a wide range of networking topics, this course provides hands-on experience and in-depth understanding of modern network technologies.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eCertifications associated with this training\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eNetwork+ IT Essentials prepares you for the CompTIA Network+ certification exam, validating your skills and expertise in network management and troubleshooting. Completing this training opens doors to various IT roles, including network technician, network administrator, and IT support specialist. Our \u003c\/span\u003e\u003cb\u003eNetwork+ IT Essentials Bundle\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003e or \u003c\/span\u003e\u003cb\u003eNetwork+ Test Prep Package\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003e are recommended for those preparing for the certification exam.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003eYour new skill set\u003cbr\u003e\u003c\/b\u003e\u003cspan style=\"font-weight: 400;\"\u003eOSI and TCP\/IP models, network topologies, cabling, protocols, troubleshooting techniques, network devices, IP addressing, wireless networking, cloud concepts, security principles, and more.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003e \u003c\/span\u003e\u003cb\u003eHigh level skills you’ll gain from this training:\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUnderstanding OSI and TCP\/IP models and their applications in networking\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eConfiguring and troubleshooting network topologies, cabling, and protocols\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eManaging network devices and implementing IP addressing and subnetting schemes\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eDeploying wireless networks and understanding cloud computing concepts\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eSecuring networks against various threats and vulnerabilities\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\n\u003cspan style=\"font-weight: 400;\"\u003eTroubleshooting network issues using industry-standard tools and techniques\u003c\/span\u003e\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cb\u003eAdditional skills you’ll build in this course:\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eExploring advanced network operations and security concepts\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eUnderstanding transport layer protocols, network services, and applications\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eImplementing disaster recovery and business continuity measures\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eOptimizing network performance and reliability\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eDesigning and configuring network architectures to meet organizational requirements\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eDeveloping remote access solutions for enhanced connectivity\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\" style=\"font-weight: 400;\"\u003e\u003cspan style=\"font-weight: 400;\"\u003eConfiguring and managing cloud-based network infrastructures\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cspan style=\"font-weight: 400;\"\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":43578107101384,"sku":"100032","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/CARD2_2fcc0eb0-b1a3-4fc2-8f8f-5b4fa111e4e7.jpg?v=1747909650"},{"product_id":"linux-it-essentials","title":"Linux IT Essentials","description":"","brand":"TechSkills","offers":[{"title":"Default Title","offer_id":51757023199597,"sku":"123","price":2995.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0640\/7503\/8920\/files\/linuxcard_747e7f8c-c1c3-4154-ae88-388e0eeede75.png?v=1747909632"}],"url":"https:\/\/techskills.com\/collections\/11-courses.oembed","provider":"TechSkills","version":"1.0","type":"link"}